This article explores measures to attack those malicious attackers
who seek to harm our legitimate systems. The proactive use of
exploits and bot networks that fight other bot networks, along with
social engineering and attacker techniques are all discussed in an
ethical manner.